The document provides an introduction to basic computer organization, including:
- The history and evolution of computers from the first generation using vacuum tubes to the current fifth generation focusing on artificial intelligence.
- The basic components of a computer including the central processing unit, main memory, input/output devices, and secondary storage.
- How the CPU fetches, decodes, and executes instructions from main memory to perform operations like data movement, arithmetic, and program control.
- Classifications of computers based on operating principles, application area, size, and capability.
This slide provide the introduction to the computer , instruction formats and their execution, Common Bus System , Instruction Cycle, Hardwired Control Unit and I/O operation and handling of interrupt
Introduction to computing, Analog Computers, Hybrid computers, TYPES OF COMPUTER, Parts of the Computer ,
Software, Hardware, data, Users, Input and output devices,
1. CISC VS. RISC.
2. Agenda.
3. CPU Architecture.
4. Instruction Set Architecture (ISA). Group of instructions to execute a program. Instructions are in the form of: Opcode + Operand. An agreement between hardware and human for making interaction. Example : ADD R1, R2, R3
Can be represented as :
00101111100001111001010101010101
10111010100011110101001011011010
Two major schools of ISA: CISC & RISC.
5. CISC Philosophy (Complex Instruction Set Computing). The primary goal is to complete a task in as few lines as possible. Used on PCs and laptops that need to process heavy graphics and computations. Each instruction consist of one step.
(ex: MULT 2:3, 5:2, load the two values into registers, multiplies the operands, and then stores the product in appropriate register).
6. CISC Pros & Cons. Instruction size is different from one operation to another. Operation size is smaller but no of cycles are more. Needs better hardware and powerful processing. Performance is slow due to the amount of clock time taken by different instructions.
7. RISC Philosophy (Reduced Instruction Set Computing). Use only simple instructions that can be executed within one clock cycle. Keep all instructions of same size. Allow only load/store instruction to access the memory.
(ex: MULT command divided into three separate commands:LOAD, PROD, and STORE).
8. RISC Pros & Cons. Allow free use of microprocessors space because of its simplicity. Needs large memory caches on the chip itself so require very fast memory. Give support for high level languages (like C, C++, Java). Performance depends on the programmer or compiler.
9. CPU Performance Equation. The following equation is commonly used for expressing a computer's performance ability:
퐶푃푈 푇푖푚푒=푆푒푐표푛푑푠/푃푟표푔푟푎푚=퐼푛푠푡푟푢푐푡푖표푛푠/푃푟표푔푟푎푚 푥 퐶푦푐푙푒푠/퐼푛푠푡푟푢푐푡푖표푛푠 푥 푆푒푐표푛푑푠/퐶푦푐푙푒
CISC minimize the number of instructions per program.
RISC does the opposite, reduce the cycles per instruction.
10. Summary.
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Introduction to Computer Software, Classification of Computer Software, Computer BIOS, Operating System, Utility Software, Compiler and Interpreter, Linker and Loader, Application Software, Programming Languages
Embedded systems are inseparable part of our life. Whether we are at home or office or on the move, we are always surrounding by embedded systems. Starting from home appliance like TV, washing machine and system like printer and elevator in workplace to the automobiles and automatic traffic control system are all example of embedded system. All kind of magazines and journals regularly dish out detail about latest technologies, new devices; fast applications which make us believe that our basic survival is controlled by these embedded product.
With growth and advancements in the field of electronics, wireless communications, networking, cognitive and affective computing and robotics, devices around you communicate in more ways than you ever imagined. Those times are not very distant when every object around us will have a small processor/sensor embedded within itself, invisible to us but still communicating with all other devices around, making our lives more connected and accessible than ever before. The future of embedded systems lies in the advancement of technologies that enable faster communications, heavy data storage capacities and highly interwoven connections among the devices. Before diving into the enormous number of applications of embedded systems. In many major countries also, Precision farming has gained a lot of traction.
For 11th and 12th grade students, a powerpoint presentation on the topic "Getting started with C++".
Subject: Computer Science / Information Technology
That's all folks, see ya :)
This slide provide the introduction to the computer , instruction formats and their execution, Common Bus System , Instruction Cycle, Hardwired Control Unit and I/O operation and handling of interrupt
Introduction to computing, Analog Computers, Hybrid computers, TYPES OF COMPUTER, Parts of the Computer ,
Software, Hardware, data, Users, Input and output devices,
1. CISC VS. RISC.
2. Agenda.
3. CPU Architecture.
4. Instruction Set Architecture (ISA). Group of instructions to execute a program. Instructions are in the form of: Opcode + Operand. An agreement between hardware and human for making interaction. Example : ADD R1, R2, R3
Can be represented as :
00101111100001111001010101010101
10111010100011110101001011011010
Two major schools of ISA: CISC & RISC.
5. CISC Philosophy (Complex Instruction Set Computing). The primary goal is to complete a task in as few lines as possible. Used on PCs and laptops that need to process heavy graphics and computations. Each instruction consist of one step.
(ex: MULT 2:3, 5:2, load the two values into registers, multiplies the operands, and then stores the product in appropriate register).
6. CISC Pros & Cons. Instruction size is different from one operation to another. Operation size is smaller but no of cycles are more. Needs better hardware and powerful processing. Performance is slow due to the amount of clock time taken by different instructions.
7. RISC Philosophy (Reduced Instruction Set Computing). Use only simple instructions that can be executed within one clock cycle. Keep all instructions of same size. Allow only load/store instruction to access the memory.
(ex: MULT command divided into three separate commands:LOAD, PROD, and STORE).
8. RISC Pros & Cons. Allow free use of microprocessors space because of its simplicity. Needs large memory caches on the chip itself so require very fast memory. Give support for high level languages (like C, C++, Java). Performance depends on the programmer or compiler.
9. CPU Performance Equation. The following equation is commonly used for expressing a computer's performance ability:
퐶푃푈 푇푖푚푒=푆푒푐표푛푑푠/푃푟표푔푟푎푚=퐼푛푠푡푟푢푐푡푖표푛푠/푃푟표푔푟푎푚 푥 퐶푦푐푙푒푠/퐼푛푠푡푟푢푐푡푖표푛푠 푥 푆푒푐표푛푑푠/퐶푦푐푙푒
CISC minimize the number of instructions per program.
RISC does the opposite, reduce the cycles per instruction.
10. Summary.
Subject Outline
introduction to Information communication and technology
1.Introduction to ICT
2.Basic building blocks of a computer
3.Hardware system of a computer
4.Software system of a computer
5.Computing algorithms
6.Computer networks
7.Computer security
Introduction to Computer Software, Classification of Computer Software, Computer BIOS, Operating System, Utility Software, Compiler and Interpreter, Linker and Loader, Application Software, Programming Languages
Embedded systems are inseparable part of our life. Whether we are at home or office or on the move, we are always surrounding by embedded systems. Starting from home appliance like TV, washing machine and system like printer and elevator in workplace to the automobiles and automatic traffic control system are all example of embedded system. All kind of magazines and journals regularly dish out detail about latest technologies, new devices; fast applications which make us believe that our basic survival is controlled by these embedded product.
With growth and advancements in the field of electronics, wireless communications, networking, cognitive and affective computing and robotics, devices around you communicate in more ways than you ever imagined. Those times are not very distant when every object around us will have a small processor/sensor embedded within itself, invisible to us but still communicating with all other devices around, making our lives more connected and accessible than ever before. The future of embedded systems lies in the advancement of technologies that enable faster communications, heavy data storage capacities and highly interwoven connections among the devices. Before diving into the enormous number of applications of embedded systems. In many major countries also, Precision farming has gained a lot of traction.
For 11th and 12th grade students, a powerpoint presentation on the topic "Getting started with C++".
Subject: Computer Science / Information Technology
That's all folks, see ya :)
General features of computer – Evolution of computers; Computer Applications – Data Processing – Information Processing – Commercial – Office Automation – Industry and Engineering – Healthcare – Education – Disruptive technologies.
The Five Generations of Computers
Basic levels of the Computer
Software
Hardware
Liveware
Computer Language
Types of Memory
Networking
Local Area Network (LAN)
Wide Area Network (WAN)
Types of Servers
Modulation and Demodulation ( MODEM)
ISDN (Integrated Service Digital Network)
Digital Subscriber Line (DSL)
LEASED LINES
Types of Topology
INTRODUCTION
3NF and BCNF
Decomposition requirements
Lossless join decomposition
Dependency preserving decomposition
Disk pack features
Records and Files
Ordered and Unordered files
2NF,NF,3NF,BCNF
INTRODUCTION
Relational Query Languages
Formal Query Languages
Introduction to relational algebra
Set Operators Join operator
Aggregate functions, Grouping
Relational Calculus concepts
Introduction to Structured Query Language (SQL)
Features of SQL, DDL Statements
Database Systems
DBMS
Database System Environment
Traditional File Systems
Advantages of DBMS over File Systems
Disadvantages of DBMS
DBMS
Describing and Storing data in DBMS
Three Schema Architecture
Data Independence
Queries
Transactions
Structure of DBMS
Users of DBMS
Steps in database Design Process
ER Concepts and Notations
Class Hierarchies
1 Planning the Computer Program
2 Uses of Algorithm
3 Flow Charts
4 Pseudo code Applications: To produce an ordered sequence of steps, that describe solution of a problem.
1.History of C Language, Structure of a C program, Statements, Basic Data Types, Variables &Constants, Input & Output statements, Operators and Precedence, Expressions, Simple C programs.
Memory Hierarchy
RAM
Memory Chip Organization
ROM
Flash Memory
Types of Programming Languages
Compiler vs Interpreter vs Assembler
Types of programming languages
Compiler vs interpreter vs assembler
high level language vs assembly level language vs low level language
1.1Explain types of Input Devices (Keyboard, Mouse, Pen, and Touch Screen Scanners, Output Devices (Monitor, printer, Speakers, Projectors) and of Storage Devices (Hard Disks, CD-ROMS, DVD-ROMS, USB Storage)[D] Operate computer and its peripherals
1.2 Booting the computer. Common start-up errors and their remedies.
Connecting peripherals – keyboard, mouse, monitor, power cables,
UPS to the computer and checking all connections. Demonstrate procedure for the installation of setting up a new computer along with other peripherals (keyboard, scanner, printer)[M]
1.3Demonstrate Keyboard layout and functions of different keys.[M]
1.4Demonstrate Proper shut down of PC, and explain precautions to avoid an improper shut down.[M]
1.5Identifying the different hardware parts in the PC.[M]
1.6Determining the configuration of the PC.[M]
1.7 Explain types of Central Processing Unit (Processors, RAM, ROM)[M]
1.8 Demonstrate procedure for installation /
replacement / maintenance procedures for hard disk and other peripherals.[D]
Introduction
Plotting basic 2-D plots.
The plot command
The fplot command
Plotting multiple graphs in the same plot
Formatting plots
USING THE plot() COMMAND TO PLOT
MULTIPLE GRAPHS IN THE SAME PLOT
MATLAB PROGRAM TO PLOT VI CHARACTERISTICS OF A DIODE
SUMMARY
Arrays
Array Creation , Accessing Elements
Sub Arrays, Representation, Operations
Maximum and Minimum values in Matrix
Potential Energy-Spring Problem
SUMMARY
An introduction to AI,ML,DL
Working of AI System
Scope of AI ,Cyber Security and BCT in Marine
Marine Education Scope of AI and BCT
Changes Required in Curriculum
Cyber security in Marine field
Parametric Analysis
Skill Set Requirement
Introduction
Overview of Loop statement
For loop
While loop
Nested loop
While loop vs for loop
prime number using matlab
armstrong number using matlab
special number using matlab
magic number using matlab
perfect number using matlab
pattern display number using matlab
palindrome number using matlab
fibonnacci series using matlab
MS word complete tutorials,Topics to be covered :
1. Create and save documentation.
2. Open, find, and rename files and folders.
3. Use “Formatting Toolbar”.
4. Use spelling and grammar checks in the document.
5. Use “Headers and Footers”.
6. Insert symbols and pictures.
7. Create tables in MS-Word.
8. Use formulas in MS –WORD Mail merge, Embedding Excel to WORD. Applications : To create a professional grade document.
Guidelines for ER to Relational Mapping.
Mapping rules/ guidelines for mapping various ER constructs to Relational model with appropriate examples
Relational Query Languages Formal Query Languages
Introduction to Relational Algebra
Relational operators
Set operators
Join operators
Aggregate functions.
Grouping operator
Relational Calculus concepts
Relational algebra queries for data retrieval with sample relational schemas. relational algebra operations.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
4. Computer is an electronic device.
Can store large amounts of data.
Can performing operations on data.
Performing given function on the data & displays the result as
output.
Process data whenever needed.
Known from ‘to compute’
1.1 What is Computer ?
5. Characteristic's of Computer
1.1 Computer:
Computer is an electronic device which is used to store the data, as per given instructions it
gives results quickly and accurately.
Data :
Data is a raw material of information.
Information :
Proper collection of the data is called information.
1.2 Characteristics of Computer
1. SPEED : In general, no human being can compete to solving the complex computation, faster than computer.
2. ACCURACY : Highest accuracy
3. AUTOMATIC (SPONTANEOUS)
4. DILIGENCE (ENDURANCE) : Computer can work for hours without any break and creating error.
5. ADAPTABILITY
6. VERSATILITY : We can use computer to perform completely different type of work at the same time.
7. ARTIFICIAL INTELLIGENCE: AI/ML/DL/Soft AI/Hard AI
8. STORAGE :Huge Storage
9. NO IQ : Computer does not work without instruction.
10. ARITHMETICAL AND LOGICAL OPERATIONS
11. RELIABILITY
7. Computer works on data as per program is called process.
Processing means operations like…..
Calculations,
Logical decision making,
Outputting data,
Communicating with others computer etc.
What is Process?
8. 1.3 History and Evolution of Computers
Abacus
Napier ’s Bones
Pascaline
Punched Card System
Tabulator
Transistors
10. 1.4 Generations of Computers
First Generation: Vacuum Tubes (1940-1956) :
Second Generation: Transistors (1956-1963):
Third Generation: Integrated Circuits (1964-1971):
Fourth Generation: Microprocessors (1971-Present):
Fifth Generation: Artificial Intelligence (Present and Beyond):
First Generation: Vacuum Tubes (1940-1956) :
The first computer systems used vacuum tubes for circuitry and magnetic drums for
memory, and were often enormous, taking up entire rooms. These computers were very
expensive to operate and in addition to using a great deal of electricity, the first computers
generated a lot of heat, which was often the cause of malfunctions.
First generation computers relied on machine language, the lowest-level programming
language understood by computers, to perform operations, and they could only solve one
problem at a time. It would take operators days or even weeks to set-up a new problem.
Input was based on punched cards and paper tape, and output was displayed on printouts.
11. 1.4 Generations of Computers
Second Generation: Transistors (1956-1963):
The world would see transistors replace vacuum tubes in the second generation of
computers. The transistor was invented at Bell Labs in 1947 but did not see
widespread use in computers until the late 1950s.
The transistor was far superior to the vacuum tube, allowing computers to become
smaller, faster, cheaper, more energy-efficient and more reliable than their first-
generation predecessors. Though the transistor still generated a great deal of heat
that subjected the computer to damage, it was a vast improvement over the vacuum
tube. Second-generation computers still relied on punched cards for input and
printouts for output.
Third Generation: Integrated Circuits (1964-1971):
The development of the integrated circuit was the hallmark of the third generation of
computers. Transistors were miniaturized and placed on silicon chips, called
semiconductors, which drastically increased the speed and efficiency of computers.
12. 1.4 Generations of Computers
Fourth Generation: Microprocessors (1971-Present):
The microprocessor brought the fourth generation of computers, as thousands of
integrated circuits were built onto a single silicon chip. What in the first generation
filled an entire room could now fit in the palm of the hand. The Intel 4004 chip,
developed in 1971, located all the components of the computer—from the central
processing unit and memory to input/output controls—on a single chip.
Fifth Generation: Artificial Intelligence (Present and Beyond):
Fifth generation computing devices, based on artificial intelligence, are still in
development, though there are some applications, such as voice recognition, that are
being used today. The use of parallel processing and superconductors is helping to
make artificial intelligence a reality.
Quantum computation and molecular and nanotechnology will radically change the
face of computers in years to come. The goal of fifth-generation computing is to
develop devices that respond to natural language input and are capable of learning
and self-organization.
14. Classification based on Operating
Principles
◦ A. Digital Computers
◦ B. Analog Computers
◦ C. Hybrid Computers
Classification based on Area of
Application
◦ A. Special Purpose Computers
A. B. General Purpose Computers
Classification based on Size and
Capability
◦ A. Microcomputers(Personal Computer)
i. Desktops
ii. Portables
B. Minicomputer
C. Mainframe computers
D. Supercomputer
1.5 Classification digital Computer
Classification based on Number of
Microprocessors
i. a. Sequential computers and
ii. Parallel computers
Classification based on Word Length and
Number of Users
i. Single User
ii. Multi User
iii. Network
15. Classification based on Size and Capability
Personal computer
A single-user computer
Can be useful at School, Home, etc.
Known as Micro Computer
Laptop, Desktop
Workstation
A powerful, single-user computer.
A workstation is like a personal computer, but it has a
more powerful microprocessor
higher-quality monitor.
Can be found in companies etc.
Minicomputer
A multi-user computer
Capable of supporting from 10 to hundreds of users
simultaneously.
Can be found in banks, government departments etc.
1.5 Classification based on Size & Capability
Mainframe
A powerful multi-user computer
Capable of supporting hundreds or thousands
of users simultaneously.
Supercomputer
An extremely fast computer
Can perform hundreds of millions of
instructions per second
Weather, scientific research can be done by
these types of computer.
16. Computer Hardware
Parts of computer, which can be touch is called hardware.
(Physical Parts)
Monitor
CPU
Key Board
Mouse
Speaker
Computer Software
Parts of computer, which can not be touch is called software.
Operating System Software : Windows, MAC, Linux
Application Software : MS Office, Photoshop, Media Player
Internet Browser Software : Internet Explorer, Google Chrome,
Mozilla Firefox, etc.
1.6 Hardware/Software
17. 1.6 Basic Computer Organization
Important Points
The basics of computer system organization
The stored program concept
How computer’s main memory is organized
Types of instructions for a typical processor
Scale and performance factors
based on stored program design
processor system
CPU
memory
input/output system
input/output devices
secondary storage
19. 1.6 Basic Computer Organization
Central Processing Unit
◦ Manages the instruction-execution cycle
◦ FETCH – DECODE – EXECUTE
◦ Coordinates the activities of other devices
Main Memory
(fast access) storage device for preserving binary data and instructions
memory is divided into units or words
each is usually a standard size or fixed-length
each memory word has a unique address for random access
Random Access Memory (RAM) : Readable,Writeable,usually volatile (e.g., Dynamic
RAM or DRAM) ,general storage
Read Only Memory (ROM) :Readable,Permanent,Nonvolatile,Special-purpose storage
for data and instructions
21. 1.6 Basic Computer Organization
Inside the CPU
memory
address
register
instruction
register
memory
data
register
program
counter
accumulator
(work
register)
arithmetic
logic unitsystem
clock
22. 1.6 Basic Computer Organization
Types of Processor Operations
Data Movement Operations
Moving data from memory to the CPU
Moving data from memory to memory
Input and output
Arithmetic and Logical Operations
Integer arithmetic
Comparing two quantities
Shifting, rotating bits in a quantity
Testing, comparing, and converting bits
Program Control
starting a program
halting a program
skipping to other instructions
testing data to decide whether to skip over some instructions
23. 1.8 Applications of Computer
Science research
Education
Business applications
Banking
Office Automation
Desktop publishing
Management aids
Engineering designing
Road traffic control
Railway
Medicine
Information services
Applications
25. 1.9 Computer Memory
Primary memory:
Primary memory is the only type of memory which is directly accessed by the CPU. The
CPU continuously reads instructions stored in the primary memory and executes them.
Any data that has to be operated by the CPU is also stored. The information is transferred
to various locations through the BUS. Primary memories are of two types. They are:
RAM
ROM
RAM: It stands for Random Access Memory. Here data can be stored temporarily, so this
type of memory is called as temporary memory or volatile memory because when power
fails the data from RAM will be erased. The information stored in the RAM is basically
loaded from the computer’s disk and includes information related to the operating system
and applications that are currently executed by the processor. RAM is considered random
access because any memory cell can be directly accessed if its address is known. RAM is of
distinct types like SRAM, DRAM, and VRAM.
ROM: It stands for Read Only Memory. In this, the data will be furnished by the
manufacturers regarding the system, so this information can simply be read by the user
but cannot add new data or it cannot be modified. ROMs are of distinct types:
PROM – Programmable Read Only Memory
EPROM – Erasable Programmable Read Only Memory
EEPROM – Electrically Erasable Programmable Read Only Memory
26. 1.9 Computer Memory
Secondary memory:
Secondary memory or auxiliary memory consists of slower and less expensive device that
communicates indirectly with CPU via main memory. The secondary memory stores the
data and keeps it even when the power fails. It is used to store or save large data or
programs or other information. The secondary storage devices are explained below:
Magnetic disks, Magnetic tape, Optical disk,USB flash drive
Mass storage devices
1.Magnetic disks: Magnetic disks are made of rigid metals or synthetic plastic material.
The disk platter is coated on both the surfaces with magnetic material and both the
surfaces can be used for storage. The magnetic disk furnishes direct access and is for both
small and large computer systems. The magnetic disk comes in two forms:
Floppy disks
Hard disks
2. Magnetic tape: magnetic tape is serial access storage medium and it can store a large
volume of data at low costs. The conventional magnetic tape is in reels of up to 3600 feet
made of Mylar plastic tape. The tape is one-half inch in width and is coated with magnetic
material on one side. The reel of tape is loaded on a magnetic tape drive unit. During any
read/write operation, the tape is moved from one spool to another in the same way as in
the audiocassette tape recorder. The magnetic tape is densely packed with magnetic spots
in frames across its width.
27. 1.9 Computer Memory
3. Optical drives: optical drives are a storage medium from which data is read and to
which it is written by lasers. Optical disks can store much more data up to 6GB. Optical
store devices are the most widely used and reliable storage devices. The most widely used
type of optical storage devices are explained below:
CD – ROM,DVD – ROM,CD – RECORDABLE,CD – REWRITABLE,PHOTO – CD
4. USB flash drives: USB flash drives are removable, rewritable and are physically much
smaller drives, which have the weight of less than 30g. In the year of 2010, the storage
capacity of the USB flash drives was as large as 256GB. Such devices are a good substitute
for floppy disks and CD – ROMs as they are smaller, faster, have thousands of times more
capacity, and are more durable and reliable. Until 2005, most desktop and laptop
computers had floppy disk drives, but nowadays floppy disk drives have been abandoned
in favor of USB ports. The USB connector is often protected inside a removable cap,
although it is not likely to be damaged if unprotected. USB flash drives draw power from
the computer through external USB connection.
5. Mass storage devices: Mass storage devices refer to the saving of huge data in a
persistent manner. Mass storage machines can store up to several trillion bytes of data and
hence are used to store or save large databases, such as the information of customers of a
big retail chain and library transactions of students in a college. Some of the commonly
used mass storage devices are explained below:
Disk array, Automated tape, CD – ROM jukebox